Mitigation of liveness attacks in DAG-based ledgers.
Darcy CamargoAndreas PenzkoferSebastian MüllerWilliam SandersPublished in: CoRR (2023)
Keyphrases
- directed acyclic graph
- countermeasures
- security flaws
- malicious attacks
- chosen plaintext
- case study
- multiscale
- digital image watermarking
- security protocols
- detect malicious
- malicious users
- denial of service attacks
- data publishing
- traffic analysis
- security threats
- data mining
- security mechanisms
- risk management
- database systems
- genetic algorithm